Author:
Genge Béla,Siaterlis Christos
Subject
Information Systems and Management,Computer Science Applications,Safety, Risk, Reliability and Quality,Modeling and Simulation
Reference18 articles.
1. S. Baker, N. Filipak, K. Timlin, In the Dark: Crucial Industries Confront Cyberattacks, McAfee Report 21900rpt_cip_0311, McAfee, Santa Clara, California, 2011.
2. M. Bateman, S. Bhatti, G. Bigwood, D. Rehunathan, C. Allison, T. Henderson, D. Miras, A comparison of TCP behavior at high speeds using ns-2 and Linux, in: Proceedings of the Eleventh Communications and Networking Simulation Symposium, 2008, pp. 30–37.
3. Unavailability of critical SCADA communication links interconnecting a power grid and a telco network;Bobbio;Reliability Engineering and System Safety,2010
4. Fidelity of network simulation and emulation: a case study of TCP-targeted denial-of-service attacks;Chertov;ACM Transactions on Modeling and Computer Simulation,2008
5. C. Deccio, Maintenance, mishaps and mending in deployments of the domain name system security extensions (DNSSEC), International Journal of Critical Infrastructure Protection 5(2) (2012) 98–103.
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献